IAS - Lesson 1

IAS - Lesson 1

University

15 Qs

quiz-placeholder

Similar activities

Activity 1 - IAS 101

Activity 1 - IAS 101

University

12 Qs

Principles of Security

Principles of Security

University

20 Qs

IAS 101 - Activity 3

IAS 101 - Activity 3

University

20 Qs

Chapter 1: Introduction to Cyber Security

Chapter 1: Introduction to Cyber Security

University

15 Qs

UTS Pengantar Keamanan Siber dan S_Informasi

UTS Pengantar Keamanan Siber dan S_Informasi

University

10 Qs

cyber awareness

cyber awareness

University

20 Qs

TCP256 Finals Quiz 1

TCP256 Finals Quiz 1

University

20 Qs

Keamanan Siber (T3)

Keamanan Siber (T3)

University

20 Qs

IAS - Lesson 1

IAS - Lesson 1

Assessment

Quiz

Computers

University

Medium

Created by

Coo K

Used 2+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The security goal of ensuring that you can access information systems and their data when you need them. They must be available in a dependable and timely manner. This is called?

Availability

Confidentiality

Integrity

Authencity

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The security goal of ensuring that only authorized persons can access information systems and their data. This is called?

Availability

Confidentiality

Integrity

Authencity

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A successful attack against a vulnerability is called?

external attacker

exploit

patch

risk

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An attacker that has no current relationship with the organization they're attacking is called?

external attacker

internal attacker

physical safeguard

management

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The study and practice of protecting information. The main goal of information security is to protect its confidentiality, integrity, and availability is called?

information security

computer security

physical safeguard

administrative safeguard

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The security goal of ensuring that no changes are made to information systems and their data without permissions is called?

Availability

Confidentiality

Integrity

Authenticity

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An attacker that has a current relationship with the organization he or she is attacking. It can be an angry employee. This is called?

external attacker

internal attacker

physical safeguard

subject of an attack

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?

Discover more resources for Computers